11 Cos è il Cybercrime? (2nd try!) 11 Computer crime - From Wikipedia, the free encyclopedia (Redirected from Cybercrime: Computer crime refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of the crime (Moore 2000). Netcrime refers, more precisely, to criminal exploitation of the Internet [1]. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child porn, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, financial theft, and other cross-border crimes sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions, with the International Criminal Court among the few addressing this threat. [2]

13 Hackers Profiling Project (UNICRI, ISECOM, CLUSIT) 13 PROFILE OFFENDER ID LONE / GROUP HACKER TARGET MOTIVATIONS / PURPOSES Wanna Be Lamer 9-16 years I would like to be a hacker, but I can t GROUP End-User For fashion, It s cool => to boast and brag Script Kiddie years The script boy GROUP: but they act alone SME / Specific security flaws To give vent of their anger / attract mass-media attention Cracker years The destructor, burned ground LONE Business company To demonstrate their power / attract mass-media attention Ethical Hacker years The ethical hacker s world LONE / GROUP (only for fun) Vendor / Technology For curiosity (to learn) and altruistic purposes Quiet, Paranoid, Skilled Hacker years The very specialized and paranoid attacker LONE On necessity For curiosity (to learn) => egoistic purposes Cyber-Warrior years The soldier, hacking for money LONE Symbol business company / End-User For profit Industrial Spy years Industrial espionage LONE Business company / Corporation For profit Government Agent years CIA, Mossad, FBI, etc. LONE / GROUP Government / Suspected Terrorist/ Strategic company/ Individual Espionage/ Counter-espionage Vulnerability test Activity-monitoring Military Hacker years LONE / GROUP Government / Strategic company Monitoring / controlling / crashing systems

14 Industrial Espionage: cos è? 14 (da wikipedia) Industrial espionage or corporate espionage is espionage conducted for commercial purposes instead of national security purposes. Espionage takes place in many forms. In short, the purpose of espionage is to gather knowledge about (an) organization(s). A spy may be hired, or may work for oneself.

15 Zooming 15 The term is distinct from legal and ethical activities such as examining corporate publications, websites, patent filings, and the like to determine the activities of a corporation (this is normally referred to as competitive intelligence). Theoretically the difference between espionage and legal information gathering is clear. In practice, it is sometimes quite difficult to tell the difference between legal and illegal methods. Especially if one starts to consider the ethical side of information gathering, the border becomes even more blurred and elusive of definition. Industrial espionage describes activities such as theft of trade secrets, bribery, blackmail, and technological surveillance. As well as spying on commercial organizations, governments can also be targets of commercial espionage for example, to determine the terms of a tender for a government contract so that another tenderer can underbid. Industrial espionage is most commonly associated with technology-heavy industries, particularly the computer and automobile sectors.

16 Una riflessione 16 Information can make the difference between success and failure; if a trade secret is stolen, the competitive playing field is levelled or even tipped in favor of a competitor. (ne parleremo dopo)

17 Cos è l Intelligence? (agenzie) 17 From wikipedia: (http://en.wikipedia.org/wiki/intelligence agency) An intelligence agency is a governmental agency that is devoted to the information gathering (known in the context as "intelligence") for purposes of national security and defense. Means of information gathering may include espionage, communication interception, cryptanalysis, cooperation with other institutions, and evaluation of public sources. The assembly and propagation of this information is known as intelligence analysis. Intelligence agencies can provide the following services for their national governments: provide analysis in areas relevant to national security; give early warning of impending crises; serve national and international crisis management by helping to discern the intentions of current or potential opponents; inform national defense planning and military operations; protect secrets, both of their own sources and activities, and those of other state agencies; and may act covertly to influence the outcome of events in favor of national interests. Intelligence agencies are also involved in defensive activities such as counter-espionage or counter-terrorism. Some agencies are accused of being involved in assassination, arms sales, coups d'état, and the placement of misinformation (propaganda) as well as other covert operations, in order to support their own or their governments' interests.

19 Cos è l Information Warfare? (cont.) 19 From wikipedia: (http://en.wikipedia.org/wiki/information_warfare ) Information warfare is the use and management of information in pursuit of a competitive advantage Over an opponent. Information warfare may involve Collection of tactical information, assurance(s) that one's own information is valid, spreading of propaganda or disinformation to demoralize the enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to psychological warfare.

20 Attention, please! Se cerchiamo Cyber Warfare, Wikipedia sa di che cosa stiamo parlando! (anche se, lo inserisce sotto computer crimes.strana la vita eh ) The U.S. Department of Defense (DoD) notes that cyberspace has emerged as a national-level concern through several recent events of geo-strategic significance. Among those are included the attack on Estonia's infrastructure in 2007, allegedly by Russian hackers. "In August 2008, Russia again allegedly conducted cyber attacks, this time in a coordinated and synchronized kinetic and non-kinetic campaign against the country of Georgia. Fearing that such attacks may become the norm in future warfare among nation-states, the concept of cyberspace operations impacts and will be adapted by warfighting military commanders in the future.

67 Internet Service Provider 67 The persons on investigation were directors of a company involved in purchasing large quantities of duty free cigarettes and alcohol to sell on the domestic market contrary to their export-duty free status, thus avoiding tax obligations. In one file, the bank account in Belgium of an individual was credited by wire transfers from an Internet payment service provider (small amounts for a total of EUR 4 700). The subject was under investigation in another European country for the sale of drug starters. Information from law enforcement confirmed that the subject was selling drug starters via a commercial website. On 27 April 2007, a federal grand jury in Washington, D.C., indicted two companies operating a digital currency business and their owners. The indictment charges E-Gold Ltd., Gold and Silver Reserve, Inc., and their owners with one count each of conspiracy to launder monetary instruments, [...]. According to the indictment, persons seeking to use the alternative payment system E-Gold were only required to provide a valid address to open an E-Gold account no other contact information was verified. The majority of the wire transfers are of small amounts (maximum EUR 800), originate from various senders and, following the message accompanying the payment, should be related to sales on a commercial website, sometimes the sales of luxury goods. Payments are not made through an Internet payment service provider but originate from the bank account of the buyer and are credited on the bank account of the seller. The wire transfers are followed by instant withdrawals in cash. The goods are never delivered to the buyer (victim of a non-delivery fraud).

68 Calcio? 68 The FIU of country B received a disclosure from a bank with regard to suspicious transactions concerning club A. This club, which was in financial difficulties, was looking for funds (several million EUR) in order to avoid bankruptcy. A financing proposal was put forward by a financial group established in South America. It was linked to an individual that had already invested funds in various foreign clubs. These funds were suspected to be of illegal origin. After the bank inquired into the origin of the funds the financial group withdrew from the negotiations. A second financing proposal was then put forward by Mr. COX, a European investor through his company located in a tax haven. Suspicions were aroused because this individual, unfamiliar to the world of sports, had suddenly suggested investing money of unknown origin in club A. Additional information showed that Mr. COX was known to the police and FIU for various cases of fraud. In this case the different possibilities for investing in club A can be considered to be attempts to launder money of illegal origin. Italy has experienced an attempt to launder money through the purchase of a famous Italian football team. The investigations16 to detect the case started from judicial proceedings in The Procura della Repubblica suspected that financial crimes were occurring, such as, money laundering, insider trading and misuse of market information.. [ ] Investigations uncovered evidence that the money used to buy the shares was supplied by a criminal association operating in Central Italy. Further, a part of that money, supposedly offered to the football team as sponsorship, was then diverted to another company to purchase real estate, which was subsequently seized by Italian judicial authorities. Investigators identified that the criminal association was strongly interested in purchasing the football team with funds obtained from several offences.

WELCOME This is a Step by Step Guide that will help you to register as an Exchange for study student to the University of Palermo. Please, read carefully this guide and prepare all required data and documents.

Instructions to apply for exams ONLINE Version 01 updated on 17/11/2014 Didactic offer Incoming students 2014/2015 can take exams of courses scheduled in the a.y. 2014/2015 and offered by the Department

VENDITORE PDF ==> Download: VENDITORE PDF VENDITORE PDF - Are you searching for Venditore Books? Now, you will be happy that at this time Venditore PDF is available at our online library. With our complete

This announcement is not an offer for sale of securities in the United States. The securities referred to herein may not be sold in the United States absent registration or an exemption from registration

Key Escrow Key Escrow Ozalp Babaoglu! In many situations, a secret (key) is known to only a single individual " Private key in asymmetric cryptography " The key in symmetric cryptography or MAC where the